A guide to kernel exploitation attacking the core
The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dangerous game: This book covers the theoretical tech...
Autor principal: | |
---|---|
Otros Autores: | , |
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Burlington, MA :
Syngress
c2010.
|
Edición: | 1st edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009628271106719 |
Tabla de Contenidos:
- CONTENTS; Foreword; Preface; Acknowledgments; About the Authors; About the Technical Editor; PART I: A JOURNEY TO KERNEL LAND; CHAPTER 1 From User-Land to Kernel-Land Attacks; CHAPTER 2 A Taxonomy of Kernel Vulnerabilities; CHAPTER 3 Stairway to Successful Kernel Exploitation; PART II: THE UNIX FAMILY, MAC OS X, AND WINDOWS; CHAPTER 4 The UNIX Family; CHAPTER 5 Mac OS X; CHAPTER 6 Windows; PART III: REMOTE KERNEL EXPLOITATION; CHAPTER 7 Facing the Challenges of RemoteKernel Exploitation; CHAPTER 8 Putting It All Together: A Linux Case Study; PART IV: FINAL WORDS
- CHAPTER 9 Kernel Evolution: Future Forms of Attackand DefenseIndex